Abbreviations

**p-sz** - obligatory module of common theoretical basis, obligatory for all specialisations,

**pv-ob** - elective branch module, obligatory for selected branches,

**pv-za** - elective specialisation module, obligatory for selected specialisations,

**p-hu** - obligatory humanity module,

**p-em** - iobligatory economical-management module,

**p-pr** - obligatory project,

**pv-hu** - elective humanity module,

**v** - elective module.

module (abbreviation) | dimension | completion | type of module | lecturer | recom. year |

Statistics for Informatics ( MIE-SPI ) | 4+1 | z,zk | p-sz | Blažek, Ph.D. | 1. |

Parallel Algorithms and Systems ( MIE-PAR ) | 3+1 | z,zk | p-sz | prof. Tvrdík | 1. |

Systems Theory ( MIE-TES ) | 2+1 | z,zk | p-sz | prof. Moos | 1. |

Design for the FPGA and ASIC Technology ( MIE-NFA ) | 2+1 | z,zk | pv-ob | Schmidt, Ph.D. | 1. |

System Modeling and Analysis ( MIE-MAS ) | 2+1 | z,zk | pv-ob | doc. Janeček | 1. |

Cybernality ( MIE-KYB ) | 2+0 | zk | p-hu | doc. Jirovský | 1. |

Mathematics for Informatics ( MIE-MPI ) | 4+1 | z,zk | p-sz | doc. Šolcová | 1. |

Arithmetics and Codes ( MIE-AAK ) | 2+1 | z,zk | pv-ob | doc. Pluháček | 1. |

Parallel Computer Architectures ( MIE-PAP ) | 2+1 | z,zk | pv-ob | Šimeček, Ph.D. | 1. |

Security and Hardware ( MIE-BHW ) | 2+1 | z,zk | pv-ob | Dr.-Ing. Novotný | 1. |

elective module | 2+1 | z,zk | v | 1. | |

elective module | 2+1 | z,zk | v | 1. | |

Project Management ( MIE-PRM ) | 1+2 | z | p-em | Vala | 1. |

Problems and Algorithms ( MIE-PAA ) | 3+1 | z,zk | pv-ob | Schmidt, Ph.D. | 2. |

Systems on Chip ( MIE-SOC ) | 2+1 | z,zk | pv-ob | doc. Kubátová | 2. |

Testing and Reliability ( MIE-TSP ) | 2+1 | z,zk | pv-ob | prof. Novák | 2. |

Master project ( MIE-MPR ) | z | p-pr | 2. | ||

elective module | 2+1 | z,zk | v | 2. | |

elective module | 2+1 | z,zk | v | 2. | |

Information Security ( MIE-IBE ) | 2+0 | zk | p-em | Čermák, CSc. | 2. |

elective module | 2+1 | z,zk | v | 2. | |

IT Support to Business and CIO Role ( MIE-CIO ) | 3+0 | zk | p-em | prof. Dohnal | 2. |

obligatory humanity module | zk | pv-hu | 2. | ||

Master Thesis (MIE-DIP) | z | p-pr | 2. |

- Standard number systems and negative number representations.
- Nonstandard number systems.
- Addition, subtraction, and carry acceleration.
- Multiplication.
- Division.
- Floating point.
- Evaluating elementary functions.
- Linear codes.
- Cyclic codes.
- The RM a BCH codes.
- Burst error correction.
- Convolution codes and turbo codes.
- Error coding for arithmetic.

- Security HW modules - cryptographic accelerators, random number generators, DRM support.
- HW support for authentication and identification - smart cards, tokens, RFID.
- HW means for physical parameter measurement - biometrics.
- Side-channels - technology and architecture influence, fault security.
- System tamper resistance - physical parameter monitors, trusted platforms, secure interconnection.
- Input and ouput security, storage security.

- Introduction. IT trends and business support. CIO and CEO relationship. ICT Management (categorization, management models, services, processes).
- CIO role, responsibility. CIO Decision Cycle (business goals, innovation, strategy, plan, execution, measurement).
- The value chain and ICT support. Marketing and selling processes, business cycle.
- CIO priorities: Team management. Understanding of the business environment. ICT vision. Shape ICT demand and communicate expectations. IT Governance.
- CIO priorities: Bring business and ICT strategies together. Communication of the ICT value to business. Risk Management.
- CIO priorities: Creation of a new ICT. Change in the profile of ICT people. ICT competencies (technical, business, behavioral).
- ICT business cases on workforce (time management, meeting management, delegation).
- ICT business cases on workforce (appraisal, coaching, mentor, mentee).
- CRM as an example of ICT support of business processes. CRM and enterprise culture.
- CRM processes.
- CRM Technology. CRM innovation and the role of ICT.
- Specific tasks of ICT management (sourcing, cost cutting).
- Invited lecturer – CIO of a selected company, discussion.

- Management, management and governance, IT management.
- Information security management system, IS/ICT governance, international standards on IS/ICT security, legislation in the Czech Republic.
- Risk management.
- Physical security, access control system, information resource valuation, internal and external threats, evaluation of countermeasures,
- Administration security (guidelines, training).
- Disaster recovery planning, business continuity management, incident management,
- IS/IT audits, application security testing, penetration testing, certifications.
- Certification according ISO 27001, Best practises (ISO 17999),
- Information security trends.

- Basic leslative norms relevant for operation of computer systems and networks, basic notions.
- Classification of attacks.
- Systems for computer network operation monitoring.
- Cybernetic attacks, psychologic and social aspects of a cybernetic attack, life cycle of exploiting the system weaknesses.
- Hackers - hacker comunity, types and motivations of the hacker behaviour.
- Cyberterorism, its demonstration and methods.
- Principles of infoware, the role of intelligent agents, strategic information warfare.
- Principles of attacks on the web, trends of attacks and attackers, phases of an attack, coordination and management of an attack.
- Basic types of attacks - DoS, forged node, manipulation with address sequences.

- State description of the system, automata as models.
- Extended finite state machine (FSM), cooperating FSMs.
- Verification of the automaton model, SPIN.
- Temporal logic as a behavioral model, derived languages.
- Alternative models - Petri nets, process algebras, LOTOS.
- Time properties of applications, the RM analysis.
- Scheduling strategies, the RM and EDF scheduling.
- Queueing system models, Markov automata.
- M/M/1, M/D/1, M/M/n, and M/D/n systems, simulation.
- Performance validation and predictability.
- Performance optimization.
- Functionality validation. Dynamic checking.
- Formal verification and combined methods.

- [2] Universal algebra: groups, finite groups, Cayley tables, group types, permutation, alternating, cyclic, and symmetry groups, normal subgroups.
- Finite fields, prime order of field, rings and their properties, integral domain, ideal. Lattices.
- Introduction to category theory, classes of objects, classes of morphisms and its properties, examples of categories: grupoid, category of all lattices, category of all commutative groups, category of all integral domains, category of all relations. Homomorphisms.
- Selected problems of graph theory, types of Hamiltonian problems. Algebraic solutions of combinatorial problems, Polya enumeration theorem.
- Algebra and algorithms (Algorithms for calculations of polynom roots - Newton' method, Lehmer-Schur's method, etc.).
- Convex sets, convex hull, pure convex set, theorem on partition of convex sets, Minkowski theorem on projection.
- Selected problems of number theory, quadratic congruence, Gauss algorithms. Special primes - factorial, palindromic, cyclic, Gauss', Eisenstein's primes. Examples of applications.
- Properties of Fermat primes, Little Fermat Theorem, primality tests, Pépin test, number theory and geometry, constructability of polygons.
- Selected numerical methods, Lagrange and Hermite interpolation, numerical integration, numerical solution of ordinary differential equations, calculating of eigenvalues of matrices, methods of solving of linear equations systems.
- Fast algorithms: multiplication, numerical searching of square roots, Fourier transformation, Fermat transformation.
- Axiomatic systems and their properties, recursive functions, proofs in the axiomatic system, examples of axiomatic systems, Peano's arithmetics, von Neumann's model of numbers.
- Special logics, multi-valued logics, modal logics, fuzzy logics.

- The gist of hardware design. The role and types of decomposition. Synthetic and analytic steps. Basic economy of product design and manufacturing.
- CMOS circuits, dynamic behavior, power consumption. Technology characterization. Implementation of programmable combinational function and programmable interconnect.
- Synchronous digital design, timing, models. Clock domains, signal transfer across clock domain boundary. Metastablility.
- Top-down and bottom-up design process, its steps and iteration loops. Hardware project management, metrics. Intellectual property cores. Reuse methodology.
- Programmable devices: overview, usage, programming methods. SPLD and CPLD devices.
- FPGA devices: architecture, logical blocks, interconnect, blocks performing computation and communication, memory blocks. Dynamic behavior.
- Design styles for ASICs. The impact of deep submicron technologies. ASIC design tools.
- ASIC and FPGA workflow comparison, key differences.
- Verification techniques: formal techniques (model checking, equivalence checking), advanced simulation, assertions, hybrid assertion-based techniques.
- Physical design: routing, placement, technology mapping.
- Logic synthesis, basic phases, used formalisms. Timing-driven and power-driven synthesis.
- Behavioral synthesis, areas of use.
- System-level design, hardware-software decomposition and codesign, design by model refinement.

- Discrete optimization, examples of practical tasks. Combinatorial problems. Algorithm complexity, problem complexity.
- State, state space, search space. Basic exact search methods.
- Decidable problems. models of computation. The classes P and NP. Polynomial hierarchy. The classes PO and NPO.
- The notion of completeness. Complexity comparison techniques. The classes NP-complete and NP-hard. The structure of NP and NPO.
- Deterministic approximation algorithms. Classification of approximative problems. Pseudopolynomial algorithms. Randomization and randomized algorithms.
- Practical deployment of heuristic and exact algorithms. Experimental evaluation.
- Simple local heuristics in state space and search space.
- Simulated annealing.
- Simulated evolution: taxonomy, genetic algorithms.
- Advanced genetic algorithms: competent GA, fast messy GA, the selfish gene method. Applications to multicriterial optimization.
- Stochastic optimization: models and applications. Bayesian optimization.
- Tabu search.
- Global methods, taxonomy of decomposition-based methods. Exact and heuristic global methods, the Davis-Putnam procedure seen as a global method.

- SIMD architectures. programming, data dependency solutions, hiding latency of instructions.
- VLIW architectures, programming, speculative solutions of data dependences, solutions for exceptions.
- VLIW architectures for digital signal processing.
- Multithreaded architectures.
- Homogeneous multi-core architectures, memory subsystem, interrupts.
- Heterogeneous multi-core architectures, shared and local memory, data transfers.
- GPU architectures.
- Programming environments and tools for multicore architectures.
- Programming environments and tools for GPUs.
- Systems on chip (SoC, NoC), switching networks, synchronous and asynchronous module interconnections.
- Special parallel architectures, neural networks.

- Performance characteristics of parallel computations.
- Models of parallel systems with shared memory.
- Interconnection networks of parallel computers.
- Embeddings and simulations of interconnection networks.
- Models for interprocessor communication and routing.
- Collective communication algorithms.
- Fundamental parallel algorithmics.
- Parallel sorting algorithms.
- Parallel algorithms for linear algebra.
- Parallel combinatorial space search.

- Project management, project, process. Definition of project participants, aims, metrics, quantification, planning, budget.
- Role of the project manager (presentation, levels of communication, duties). Life cycle and stages of a project.
- Project documents. Pre-business and business stages of a project.
- Preparation and realization stages of a project. Operation and closure of a project.
- Stabilization of a project, feedback, control mechanisms (methodical, contractual, or matter-of-fact supervision), risk management.
- Contractual arrangement of a project, business negotations, quality of delivery (SLA, security), warranty.
- Demand, definition of services, evaluation of proposals, the act of public contracts, evaluation criteria.
- Financial control.
- Project team management - human resources (roles, CIO, conducting a meeting, written records, tasks).
- Management of large projects (by area, by volume). Multiproject enviroment (reporting, coordination).
- Principles of methodology of poject management – Prince2, PMI. Quality management of project according to norms ISO 10006, ISO 9001.
- Setting up project management to company (linear x project management, process management).
- Particularities of project management of IS development.

- A taxonomy and characteristics of systems on a chip (SoC). Common requirements to SoC. Implementation platforms, granularity.
- Communications on the chip, latency, throughput, architectures.
- Hardware-software decomposition, design space exploration.
- System-level timing, scheduling algorithms, time-triggered architectures.
- Real-time operating systems and their architectures, implementation of synchronization primitives, communication interfaces.
- Real-time applications, fault-tolerant software.
- Hardware timing and synchronization, cycle-accurate models, model refinement.
- Networks on chip (NoC), routing protocols and their implementation.
- Design reuse, third-party intellectual property cores, standard communication and test interfaces.
- SoC verification methods. Assertions, Property Specification Language, model checking.
- Verification by simulation, simulation cover monitoring and control, random stimuli method.
- Verification of protocols, state machines, interfaces, data paths. Equivalence checking. Software verification. Software-hardware coverification.
- Large-scale fault-tolerant systems. Fault-tolerance methods for hardware and software.

- Basics of Probability Theory: Probability Space, Definitions, Properties, Sigma-continuity, etc.
- Basics of Probability Theory: Conditional Probability, Independence, Commented Examples
- Basics of Probability Theory: Random Variables, Cumulative Distribution Function, Probability Density Function, Dependence, Random Vectors, Marginal and Joint Distribution
- Basics of Probability Theory: Conditional Distribution, Conditional Expectation, Characteristics of Random Variables, Selected Examples of Probability Distributions
- Basics of Probability Theory: Poisson Process, Simulation Methods, Generating Functions
- Basics of Probability Theory: Strong Law of Large Numbers (SLLN), Central Limit Theorem (CLT), Large Deviations, Entropy
- Discrete-time Markov Chains with Finite State Space: Basic Concepts, Irreducibility and Periodicity of States, Absorption Probability, Stopping Times
- Discrete-time Markov Chains: Examples: Generalized Random Walk, Random Walk on a Graph, Gambler's Ruin, Coupon Collector
- Discrete-time Markov Chains: Asymptotic Stationarity, Uniqueness and Existence of Stationary Distributions, Convergence
- Discrete-time Markov Chains: Branching Processes, Birth & Death processes
- Monte Carlo Methods: Markov Chain Monte Carlo (MCMC) – Basic Concepts and Examples
- Monte Carlo Methods: Fast convergence of MCMC, Propp-Wilson Algorithm, Sandwiching, Simulated Annealing
- Monte Carlo Methods: Monte Carlo Estimates, Monte Carlo Tests, Reduction of Variance
- Stochastic Processes: Definition, Distribution Function, Characteristics of Stochastic Processes
- Stochastic Processes: Characteristics and Classification of Stochastic Processes, Examples
- Basics of Queueing Theory: Elements of Queueing Systems, Request Arrival Process, Queueing Policy, Service Policy, Kendall Notation
- Stochastic Processes: Application of the Poisson Process to Model Arrivals in Queueing Systems
- Stochastic Processes: Application of the Poisson Process in Queueing Theory
- Stochastic Processes: Non-homogeneous Poisson Process, Spatial Poisson Process, M/G/infinity Queue
- Continuous-time Markov Chains: Jump Rates, Timing Jumps by Poisson Process Arrivals, Kolmogorov Equations
- Basics of Queueing Theory: M/M/m Queues, Queueing Systems
- Basics of Queueing Theory: Open and Closed Queueing Systems
- Bootstrap Methods: Properties of Bootstrap Approximations, Bootstrap Correction of Estimation Bias
- Bootstrap Methods: Bootstrap Confidence Intervals, Permutation Bootstrap
- Bootstrap Methods: Bootstrap Confidence Intervals for Parameters in Linear Regression
- Estimation of Probability Density Functions: Histogram, Kernel Estimates, Maximum Likelihood Estimation, Estimation by the Method of Moments

- System definition. Structural and functional concept of a system.
- Compositional and dynamic systems. Hard and soft systems.
- Identification of a system.
- Structural tasks of the system analysis. Paths and feedbacks.
- Tasks of decomposition and composition of a system and tasks of system goals.
- System behavior, behavior models, the notion of a process.
- Formalisms for the analysis of model behavior: Petri nets, decision tables.
- Bulk analysis and other methods of system analysis.
- Soft systems, methods of their analysis.
- Selected methodologies of system design, the SSADM method.
- System synthesis with discrete time.
- Decision and decision processes.
- Information in a system and in its neighborhood, system regularity, system viability.

- Introduction to testing of digital circuits, defects, errors, faults, failures.
- Test generation for combinational circuits, intuitive path sensitization.
- Boolean difference, the D algorithm.
- Fault diagnosis, test minimization, ATPG systems.
- Memory, processor, FPGA, SoC testing.
- IDDQ testing, testers, analog circuit testing.
- Design for testability, IEEE 1149 and 1500 standards.
- Built-in Self Test, test pattern generation, sample and response compression.
- Reliability models, reliability indicators.
- Reliability of mantained and redundant systems.
- Fault-safe systems, totally self-checking circuits.
- Reliability improving techniques, design of systems with enhanced reliability.

Last modified: 1.10.2010, 16:11